Search Results for "" The Cyber Edge ""
Not finding what you’re looking for?
10 of 951 Results
Software Factories: The Successful Path of Failure
An ecosystem emerges that crosses services and blurs the line between civilian and military innovation.
Image
How Agencies Can Defend Against Killware
A new threat emerges that needs to be addressed by the military community.
Image
Identifying Shared Vulnerabilities and Mitigation Strategies for Cloud, Wireless and IoT
Considering common characteristics could be key to effective security.
Image
Adversarial Machine Learning Poses a New Threat to National Security
A rapidly growing field of technology holds significant implications for U.S. military.
Image
Securing Machine Learning Requires a Sociotechnical Approach
Considering AI interactions with humans, organizational structures and strategies may help defenders mitigate risks.
Image
Soldiers Supply Secure Software Solutions
The Army software factory begins with security.
Image
On Point: Q&A With Raj Iyer
Q&A with Raj Iyer, Army chief information officer, who advises the secretary of the Army, setting the strategic direction and objectives for information technology and information management.
Image
Experts Highlight Continued Software Vulnerabilities
National security and cyber experts see a huge problem with chronic cyber issues for widely used programs.
Image
Federal Zero Trust Policy Implementation
One of the principal authors of the January 2022 policy to shift the U.S. government toward zero trust shares his insights.
Image
Zero Trust Key to Operational System Cyber Protection
Converging systems broadens the attack surface.
Image